Overview
Skills
Job Details
Who we are:
ShorePoint is a fast-growing, industry recognized and award-winning cybersecurity services firm with a focus on high-profile, high-threat, private and public-sector customers who demand experience and proven security models to protect their data. ShorePoint subscribes to a work hard, play hard mentality and celebrates individual and company successes. We are passionate about our mission and going above and beyond to deliver for our customers. We are equally passionate about an environment that supports creativity, accountability, diversity, inclusion and a focus on giving back to our community.
The Perks:
As recognized members of the Cyber Elite, we work together in partnership to defend our nation s critical infrastructure while building meaningful and exciting career development opportunities in a culture tailored to the individuals technical and professional growth. We are committed to the belief that our team members do their best work when they are happy and well cared for. In support of this philosophy, we offer a comprehensive benefits package, including major carriers for health care providers. Highlighted benefits offered: 18 days of PTO, 11 holidays, 80% of insurance premium covered, 401k, continued education, certifications maintenance and reimbursement and more.
Who we're looking for:
We are seeking a SOC Level 2 Analyst for a potential opportunity to provide advanced monitoring, triage and response within a 24/7 Security Operations Center (SOC) environment. This role plays a key part in identifying and investigating security incidents, advising on mitigation and improving monitoring content and procedures. The SOC Level 2 Analyst will have hands-on experience with security technologies and be ready to contribute to threat detection, content development and continuous service improvement in a fast-paced operational setting. This is a unique opportunity to shape the growth, development and culture of an exciting and fast-growing company in the cybersecurity market. Employment for this position is dependent on the successful award of the contract.
What you'll be doing:
- Monitor client sources of potential security incidents, health alerts with monitored solutions and requests for information. This includes the monitoring of real-time channels or dashboards, periodic reports, email inboxes, helpdesk or other ticketing systems, telephone calls and chat sessions.
- Follow client and incident-specific procedures to perform triage of potential security incidents to validate and determine needed mitigation.
- Escalate potential security incidents to client personnel, implement countermeasures in response to others and recommend operational improvements.
- Keep accurate incident notes in the case management system.
- Maintain awareness of the client s technology architecture, known weaknesses, the architecture of the security solutions used for monitoring, imminent and pervasive threats as identified by client threat intelligence and recent security incidents.
- Provide advanced analysis of the results of the monitoring solutions, assess escalated outputs and alerts from Level 1 Analysts.
- Perform web hunting for new patterns/activities.
- Advise on content development and testing.
- Provide advice and guidance on the response action plans for information risk events and incidents based on incident type and severity.
- Ensure that all identified events are promptly validated and thoroughly investigated.
- Provide end-to-end event analysis, incident detection and manage escalations using documented procedures.
- Devise and document new procedures and runbooks/playbooks as directed.
- Maintain monthly Service Level Agreements (SLAs).
- Maintain compliance with processes, runbooks, templates and procedures-based experience and best practices.
- Assist the Cyber Hunting team with advanced investigations as needed.
- Provide malware analysis (executables, scripts, documents) to determine indicators of compromise and create signatures for future detection of similar samples.
- Continuously improve the service by identifying and correcting issues or gaps in knowledge (analysis procedures, plays, client network models), false positive tuning, identifying and recommending new or updated tools, content, countermeasures, scripts, plug-ins, etc.
- Perform peer reviews and consultations with Level 1 Analysts regarding potential security incidents.
- Serve as a subject matter expert in at least one security-related area (e.g., specific malware solution, Python programming, etc.).
- Provide shift status and metric reporting as well as support weekly operations calls.
What you need to know:
- Strong understanding of SOC operations, incident response workflows and monitoring tools.
- Experience with malware behavior analysis and identification of indicators of compromise.
- Familiarity with APT tactics, techniques and procedures.
- Knowledge of security technologies such as SIEM, EDR, IDS/IPS and WAF.
- Understanding of networking fundamentals, protocols (TCP/IP, DNS, HTTP) and infrastructure devices.
- Awareness of security architecture principles and common defensive tools.
Must have's:
- Bachelor's degree.
- 2+ years of working in a SOC or similar security operations environment, including 1+ years of experience in security technologies such as:
- Security Information and Event Management (SIEM).
- IDS/IPS, DLP, Endpoint Detection and Response (EDR).
- Web Application Firewall (WAF), anti-virus and sandboxing solutions.
- Host- and network-based firewalls, threat intelligence platforms or penetration testing tools.
- One or more of the following certifications:
- (ISC)2 Certified Information Security Professional (CISSP)
- GIAC Certified Intrusion Analyst (GCIA)
- GIAC Continuous Monitoring (GMON)
- Certified Ethical Hacker (CEH) or equivalent.
- Proven ability to analyze complex requirements and translate them into clear, actionable tasks and processes through critical thinking.
- Must have the ability to work shifts on a rotating basis for 24/7 support of clients.
- Travel up to 15%, on average, based on the work you do and the clients and industries/sectors you serve.
- Must possess an active DOE Q Clearance or equivalent DoD Top Secret clearance at time of hire.
Beneficial to have the following:
- A strong desire to understand the what as well as the why and the how of security incidents.
- Knowledge of Advanced Persistent Threats (APT) tactics, techniques and procedures.
- Understanding of possible attack activities such as network probing/ scanning, DDOS, malicious code activity, etc.
- Understanding of common network infrastructure devices such as routers and switches.
- Understanding of basic networking protocols such as TCP/IP, DNS, HTTP.
- Basic knowledge in system security architecture and security solutions.
Where it s done:
- Onsite (Las Vegas, NV).